default search action
Sam Jabbehdari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j28]Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies. ISC Int. J. Inf. Secur. 17(1): 13-23 (2025) - 2024
- [j27]Asghar Mohammadian, Houman Zarrabi, Sam Jabbehdari, Amir Masoud Rahmani:
The effect of task processing management on energy consumption at the edge of Internet of things network with using reinforcement learning method. Comput. Ind. Eng. 195: 110426 (2024) - [j26]Seyedeh Shabnam Jazaeri
, Sam Jabbehdari
, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm. Clust. Comput. 27(2): 1503-1525 (2024) - [j25]Seyedeh Shabnam Jazaeri
, Parvaneh Asghari
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues. Multim. Tools Appl. 83(1): 1311-1377 (2024) - [j24]A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. J. Supercomput. 80(6): 7906-7930 (2024) - [i3]Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar:
Reducing the computational complexity of fuzzy identity-based encryption from lattice. IACR Cryptol. ePrint Arch. 2024: 16 (2024) - [i2]Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Fuzzy Identity Based Encryption with a flexible threshold value. IACR Cryptol. ePrint Arch. 2024: 43 (2024) - 2023
- [j23]Mohsen Askarzadeh, Majid Haghparast
, Sam Jabbehdari
:
Power consumption reduction in built-in self-test circuits. J. Ambient Intell. Humaniz. Comput. 14(2): 1109-1122 (2023) - [j22]Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments. J. Ambient Intell. Humaniz. Comput. 14(4): 4237-4255 (2023) - [j21]Bijan Pourghorbani Dinachali, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
A pricing approach for optimal use of computing resources in cloud federation. J. Supercomput. 79(3): 3055-3094 (2023) - [j20]Seyedeh Shabnam Jazaeri
, Parvaneh Asghari, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions. J. Supercomput. 79(15): 17619-17669 (2023) - 2022
- [j19]Reza Sarabi Miyanaji
, Sam Jabbehdari
, Nasser Modiri
:
Continuous lightweight authentication according group priority and key agreement for Internet of Things. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j18]Bijan Pourghorbani Dinachali, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
A cost-aware approach for cloud federation formation. Trans. Emerg. Telecommun. Technol. 33(12) (2022) - [j17]Fatemeh Shabestari
, Amir Masoud Rahmani, Nima Jafari Navimipour, Sam Jabbehdari
:
A YARN-based Energy-Aware Scheduling Method for Big Data Applications under Deadline Constraints. J. Grid Comput. 20(4): 38 (2022) - [j16]Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
A self-learning approach for proactive resource and service provisioning in fog environment. J. Supercomput. 78(15): 16997-17026 (2022) - 2021
- [j15]Seyedeh Shabnam Jazaeri
, Sam Jabbehdari
, Parvaneh Asghari
, Hamid Haj Seyyed Javadi
:
Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions. Clust. Comput. 24(4): 3187-3228 (2021) - [j14]Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi
:
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach. Trans. Emerg. Telecommun. Technol. 32(11) (2021) - [j13]Fatemeh Rismanian Yazdi, Mehdi Hosseinzadeh
, Sam Jabbehdari
:
A Hybrid Protocol for Energy Management in Wireless Body Area Networks. Wirel. Pers. Commun. 121(4): 2973-2987 (2021) - 2020
- [j12]Shahab Ghalamdoost Pirbazari
, Alireza Souri
, Reza Faghih Mirzaee
, Sam Jabbehdari
:
Multi valued parity generator based on Sudoku tables: properties and detection probability. IET Commun. 14(14): 2377-2386 (2020) - [j11]Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi
:
A dynamic fog service provisioning approach for IoT applications. Int. J. Commun. Syst. 33(14) (2020) - [j10]Babak Mosharmovahed, Mohammad Ali Pourmina
, Sam Jabbehdari
:
Providing a New Way for Sustainable Communication on the VANET Network on Mountainous Roads. Wirel. Pers. Commun. 113(4): 2243-2269 (2020)
2010 – 2019
- 2019
- [j9]Fatemeh Shabestari
, Amir Masoud Rahmani
, Nima Jafari Navimipour
, Sam Jabbehdari
:
A taxonomy of software-based and hardware-based approaches for energy efficiency management in the Hadoop. J. Netw. Comput. Appl. 126: 162-177 (2019) - [j8]Fatemeh Rismanian Yazdi
, Mehdi Hosseinzadeh
, Sam Jabbehdari
:
A Priority-Based MAC Protocol for Energy Consumption and Delay Guaranteed in Wireless Body Area Networks. Wirel. Pers. Commun. 108(3): 1677-1696 (2019) - 2018
- [j7]Mostafa Ghobaei-Arani
, Sam Jabbehdari
, Mohammad Ali Pourmina
:
An autonomic resource provisioning approach for service-based cloud applications: A hybrid approach. Future Gener. Comput. Syst. 78: 191-210 (2018) - 2016
- [j6]Mostafa Ghobaei-Arani
, Sam Jabbehdari
, Mohammad Ali Pourmina
:
An autonomic approach for resource provisioning of cloud services. Clust. Comput. 19(3): 1017-1036 (2016) - 2015
- [j5]Mohammad Masdari, Sam Jabbehdari
, Jamshid Bagherzadeh
, Ahmad Khadem-Zadeh:
Towards efficient certificate status validations with E-ADOPT in mobile ad hoc networks. Comput. Secur. 49: 17-27 (2015) - [j4]Mohammad Masdari, Sam Jabbehdari
, Jamshid Bagherzadeh
:
Secure publish/subscribe-based certificate status validations in mobile ad hoc networks. Secur. Commun. Networks 8(6): 1063-1076 (2015) - [j3]Mohammad Masdari, Sam Jabbehdari
, Jamshid Bagherzadeh
:
Improving OCSP-Based Certificate Validations in Wireless Ad Hoc Networks. Wirel. Pers. Commun. 82(1): 377-400 (2015) - 2013
- [j2]Razieh Sheikhpour
, Sam Jabbehdari
:
An Energy Efficient Chain-based Routing Protocol for Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 7(6): 1357-1378 (2013) - 2012
- [c4]Majid Nezakatolhoseini, Sam Jabbehdari
, Mohammad Ali Pourmina
:
Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems. ACITY (1) 2012: 61-70 - 2011
- [j1]Mohammad Masdari, Sam Jabbehdari
, Mohammad Reza Ahmadi, Seyyed Kamal Hashemi, Jamshid Bagherzadeh
, Ahmad Khadem-Zadeh:
A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2011: 112 (2011) - 2010
- [c3]Hossein Memarzadeh, Mehdi Dehghan
, Sam Jabbehdari
:
A New Quorum-Based Power Saving Protocol to Maintain QoS for MANETs with Burst Traffics. AINA Workshops 2010: 674-679 - [i1]Mehdi Lotfi, Sam Jabbehdari, Majid Asadi Shahmirzadi:
A New Energy Efficient Routing Algorithm Based on a New Cost Function in Wireless Ad hoc Networks. CoRR abs/1006.4557 (2010)
2000 – 2009
- 2008
- [c2]Sahar Adabi
, Sam Jabbehdari
, Ali Rezaee, Sepideh Adabi
:
Distributed Fuzzy Score-Based Clustering Algorithm for Mobile Ad Hoc Networks. APSCC 2008: 193-198 - [c1]Sahar Adabi
, Sam Jabbehdari
, Amir Masoud Rahmani
, Sepideh Adabi
:
SBCA: Score Based Clustering Algorithm for Mobile AD-hoc Networks. ICYCS 2008: 427-431
Coauthor Index
aka: H. Haj Seyyed Javadi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint